WS-C3750G-24T-E Cisco Catalyst 3750 24 Port Gigabit Layer 3 Switch

Product Description

WS-C3750G-24T-E Cisco Catalyst 3750 24 Port Gigabit Layer 3 Switch

The new Cisco Catalyst 3750-24T switch is an innovative product that improves LAN operating efficiency by combining industry-leading ease of use and the highest resiliency available for stackable switches. This new product represents the next generation in desktop switches, and features Cisco StackWise technology, a 32-Gbps stack interconnect that allows customers to build a unified, highly resilient switching system, one switch at a time.

For mid-sized organizations and enterprise branch offices, the Cisco Catalyst 3750-24T eases deployment of converged applications and adapts to changing business needs by providing configuration flexibility, support for converged network patterns, and automation of intelligent network-services configurations. In addition, the Cisco Catalyst 3750-24T is optimized for high-density Gigabit Ethernet deployments and includes a diverse range of switches that meet access, aggregation, or small-network backbone-connectivity requirements

IEEE 802.1x allows dynamic, port-based security, providing user authentication.
IEEE 802.1x with VLAN assignment allows a dynamic VLAN assignment for a specific user regardless of where the user is connected.
IEEE 802.1x with voice VLAN permits an IP phone to access the voice VLAN irrespective of the authorized or unauthorized state of the port.
IEEE 802.1x and port security are provided to authenticate the port and manage network access for all MAC addresses, including that of the client.
IEEE 802.1x with an ACL assignment allows for specific identity-based security policies regardless of where the user is connected.
IEEE 802.1x with guest VLAN allows guests without 802.1x clients to have limited network access on the guest VLAN.
CISCO security VLAN ACLs on all VLANs prevent unauthorized data flows from being bridged within VLANs.
CISCO standard and extended IP security router ACLs define security policies on routed interfaces for control-plane and data-plane traffic.
Port-based ACLs for Layer 2 interfaces allow security policies to be applied on individual switch ports.
Secure Shell (SSH) Protocol, Kerberos, and Simple Network Management Protocol Version 3 (SNMPv3) provide network security by encrypting administrator traffic during Telnet and SNMP sessions. SSH Protocol, Kerberos, and the cryptographic version of SNMPv3 require a special cryptographic software image because of U.S. export restrictions.
Private VLAN Edge provides security and isolation between switch ports, which helps ensure that users cannot snoop on other users’ traffic.
Dynamic ARP Inspection helps ensure user integrity by preventing malicious users from exploiting the insecure nature of the ARP protocol.
DHCP Snooping prevents malicious users from spoofing a DHCP server and sending out bogus addresses. This feature is used by other primary security features to prevent a number of other attacks such as ARP poisoning.